Skip to main content

2020 | OriginalPaper | Buchkapitel

Physical Layer Security of Cognitive IoT Networks

verfasst von : Güneş Karabulut Kurt, Özge Cepheli

Erschienen in: Towards Cognitive IoT Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) networks have the potential to drastically change our daily lives with a diverse set of applications. Healthcare, manufacturing, transportation and various other industries may encounter their impacts. As the IoT nodes evolve, it is only natural to expect an increase in their capabilities. Cognitive IoT (CIoT) networks contain IoT nodes with cognitive capabilities that can sense, and analyze the environment. These nodes can also act based on their analysis results. With such a potential, CIoT networks may also become a target for malicious users or attackers. In this chapter, we provide an overview of the main security requirements. Main attack types are summarized. Possible attacks on the CIoT nodes, including primary user emulation attacks, sensing data falsification attacks, objective function attacks and eavesdropping attacks are detailed. A case study targeting primary user emulation and sensing data falsification attacks based on a trust metric is detailed. Open issues are also highlighted.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gazis, V.: A survey of standards for machine-to-machine and the Internet of things. IEEE Commun. Surv. Tutor. 19(1), 482–511 (2017)CrossRef Gazis, V.: A survey of standards for machine-to-machine and the Internet of things. IEEE Commun. Surv. Tutor. 19(1), 482–511 (2017)CrossRef
4.
Zurück zum Zitat IoT European Research Cluster, Digitising the Industry—Internet of Things Connecting the Physical, Digital and Virtual Worlds—IERC Cluster Book (2016) IoT European Research Cluster, Digitising the Industry—Internet of Things Connecting the Physical, Digital and Virtual Worlds—IERC Cluster Book (2016)
5.
Zurück zum Zitat Chernyshev, M., Baig, Z., Bello, O., Zeadally, S.: Internet of things (IoT): research, simulators, and testbeds. IEEE Internet Things J. (2017) Chernyshev, M., Baig, Z., Bello, O., Zeadally, S.: Internet of things (IoT): research, simulators, and testbeds. IEEE Internet Things J. (2017)
6.
Zurück zum Zitat Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)CrossRef Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)CrossRef
7.
Zurück zum Zitat Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005)CrossRef Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23(2), 201–220 (2005)CrossRef
8.
Zurück zum Zitat Zhang, D., Chen, Z., Ren, J., Zhang, N., Awad, M.K., Zhou, H., Shen, X.S.: Energy-harvesting-aided spectrum sensing and data transmission in heterogeneous cognitive radio sensor network. IEEE Trans. Veh. Technol. 66(1), 831–843 (2017)CrossRef Zhang, D., Chen, Z., Ren, J., Zhang, N., Awad, M.K., Zhou, H., Shen, X.S.: Energy-harvesting-aided spectrum sensing and data transmission in heterogeneous cognitive radio sensor network. IEEE Trans. Veh. Technol. 66(1), 831–843 (2017)CrossRef
9.
Zurück zum Zitat Amjad, M., Akhtar, F., Rehmani, M.H., Reisslein, M., Umer, T.: Full-duplex communication in cognitive radio networks: a survey. IEEE Commun. Surv, Tutor (2017)CrossRef Amjad, M., Akhtar, F., Rehmani, M.H., Reisslein, M., Umer, T.: Full-duplex communication in cognitive radio networks: a survey. IEEE Commun. Surv, Tutor (2017)CrossRef
10.
Zurück zum Zitat Ali, A., Hamouda, W.: Advances on spectrum sensing for cognitive radio networks: theory and applications. IEEE Commun. Surv. Tutor. 19(2), 1277–1304 (2017)CrossRef Ali, A., Hamouda, W.: Advances on spectrum sensing for cognitive radio networks: theory and applications. IEEE Commun. Surv. Tutor. 19(2), 1277–1304 (2017)CrossRef
11.
Zurück zum Zitat Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Foteinos, V., Poulios, G., Moessner, K., et al.: Enabling smart cities through a cognitive management framework for the Internet of things. IEEE Commun. Mag. 51(6), 102–111 (2013)CrossRef Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Foteinos, V., Poulios, G., Moessner, K., et al.: Enabling smart cities through a cognitive management framework for the Internet of things. IEEE Commun. Mag. 51(6), 102–111 (2013)CrossRef
12.
Zurück zum Zitat Wu, Q., Ding, G., Xu, Y., Feng, S., Du, Z., Wang, J., Long, K.: Cognitive Internet of things: a new paradigm beyond connection. IEEE Internet Things J. 1(2), 129–143 (2014)CrossRef Wu, Q., Ding, G., Xu, Y., Feng, S., Du, Z., Wang, J., Long, K.: Cognitive Internet of things: a new paradigm beyond connection. IEEE Internet Things J. 1(2), 129–143 (2014)CrossRef
13.
Zurück zum Zitat Khan, A.A., Rehmani, M.H., Rachedi, A.: When cognitive radio meets the Internet of things. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 469–474. IEEE (2016) Khan, A.A., Rehmani, M.H., Rachedi, A.: When cognitive radio meets the Internet of things. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 469–474. IEEE (2016)
14.
Zurück zum Zitat Khan, A.A., Rehmani, M.H., Rachedi, A.: Cognitive-radio-based Internet of things: applications, architectures, spectrum related functionalities, and future research directions. IEEE Wirel. Commun. 24(3), 17–25 (2017)CrossRef Khan, A.A., Rehmani, M.H., Rachedi, A.: Cognitive-radio-based Internet of things: applications, architectures, spectrum related functionalities, and future research directions. IEEE Wirel. Commun. 24(3), 17–25 (2017)CrossRef
15.
Zurück zum Zitat Feng, S., Setoodeh, P., Haykin, S.: Smart home: cognitive interactive people-centric Internet of things. IEEE Commun. Mag. 55(2), 34–39 (2017)CrossRef Feng, S., Setoodeh, P., Haykin, S.: Smart home: cognitive interactive people-centric Internet of things. IEEE Commun. Mag. 55(2), 34–39 (2017)CrossRef
16.
Zurück zum Zitat Bala Krishna, M., Doja, M.N.: Symmetric key management and distribution techniques in wireless ad hoc networks. In: 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 727–731, Oct 2011 Bala Krishna, M., Doja, M.N.: Symmetric key management and distribution techniques in wireless ad hoc networks. In: 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 727–731, Oct 2011
17.
Zurück zum Zitat Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO’84, pp. 47–53. Springer, Berlin (1984) Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO’84, pp. 47–53. Springer, Berlin (1984)
18.
Zurück zum Zitat Franklin, M., Boneh, D.: Identity based encryption from weil pairing. In: Proceedings of CRYPTO 2001, pp. 213–239. Springer, Berlin (2001) Franklin, M., Boneh, D.: Identity based encryption from weil pairing. In: Proceedings of CRYPTO 2001, pp. 213–239. Springer, Berlin (2001)
19.
Zurück zum Zitat Chen, Z., Nan, X.H.: CPK Identity Authentication. National Defence Industry Press, Beijing, China (2006) Chen, Z., Nan, X.H.: CPK Identity Authentication. National Defence Industry Press, Beijing, China (2006)
20.
Zurück zum Zitat Nan, X.H., Chen, Z.: Identifier-based private key generating method and device, 20 July 2006. WO Patent: WO/2006/074, 611 Nan, X.H., Chen, Z.: Identifier-based private key generating method and device, 20 July 2006. WO Patent: WO/2006/074, 611
21.
Zurück zum Zitat Acharya, R., Asha, K.: Data integrity and intrusion detection in wireless sensor networks. In: 16th IEEE International Conference on Networks, ICON 2008, pp. 1–5, Dec 2008 Acharya, R., Asha, K.: Data integrity and intrusion detection in wireless sensor networks. In: 16th IEEE International Conference on Networks, ICON 2008, pp. 1–5, Dec 2008
22.
Zurück zum Zitat Chen, H., Fu, Z., Zhang, D.: Security and trust research in M2M system. In: 2011 IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp. 286 –290, July 2011 Chen, H., Fu, Z., Zhang, D.: Security and trust research in M2M system. In: 2011 IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp. 286 –290, July 2011
23.
Zurück zum Zitat Spadacini, M., Savazzi, S., Nicoli, M., Nicoli, S.: Wireless networks for smart surveillance: technologies, protocol design and experiments. In: Wireless Communications and Networking Conference Workshops (WCNCW), pp. 214 –219, April 2012 Spadacini, M., Savazzi, S., Nicoli, M., Nicoli, S.: Wireless networks for smart surveillance: technologies, protocol design and experiments. In: Wireless Communications and Networking Conference Workshops (WCNCW), pp. 214 –219, April 2012
24.
Zurück zum Zitat Mubarak, T.M., Sattar, S.A., Rao, G.A., Sajitha, M.: Intrusion detection: an energy efficient approach in heterogeneous WSN. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), pp. 1092–1096, March 2011 Mubarak, T.M., Sattar, S.A., Rao, G.A., Sajitha, M.: Intrusion detection: an energy efficient approach in heterogeneous WSN. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), pp. 1092–1096, March 2011
25.
Zurück zum Zitat Cheng, X., Cao, K., Xu, J., Cui, G.: Analysis on the feasibility of denial of service of GPS receivers based on hidden messages. In: 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT’09, pp. 363–368, Nov 2009 Cheng, X., Cao, K., Xu, J., Cui, G.: Analysis on the feasibility of denial of service of GPS receivers based on hidden messages. In: 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT’09, pp. 363–368, Nov 2009
26.
Zurück zum Zitat Zamani, M., Movahedi, M., Ebadzadeh, M., Pedram, H.: A DDoS-aware IDS model based on danger theory and mobile agents. In: 2009 International Conference on Computational Intelligence and Security, CIS’09, vol. 1, pp. 516–520, Dec 2009 Zamani, M., Movahedi, M., Ebadzadeh, M., Pedram, H.: A DDoS-aware IDS model based on danger theory and mobile agents. In: 2009 International Conference on Computational Intelligence and Security, CIS’09, vol. 1, pp. 516–520, Dec 2009
27.
Zurück zum Zitat Kaur, G., Saxena, V., Gupta, J.P.: Anomaly detection in network traffic and role of wavelets. In: 2010 2nd International Conference on Computer Engineering and Technology (ICCET), vol. 7, pp. V7-46–V7-51, April 2010 Kaur, G., Saxena, V., Gupta, J.P.: Anomaly detection in network traffic and role of wavelets. In: 2010 2nd International Conference on Computer Engineering and Technology (ICCET), vol. 7, pp. V7-46–V7-51, April 2010
28.
Zurück zum Zitat Kumar, S., Valdez, R., Gomez, O., Bose, S.: Survivability evaluation of wireless sensor network under DDoS attack. In: 2006 International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL 2006, p. 82, April 2006 Kumar, S., Valdez, R., Gomez, O., Bose, S.: Survivability evaluation of wireless sensor network under DDoS attack. In: 2006 International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL 2006, p. 82, April 2006
29.
Zurück zum Zitat Roh, H., Jung, S.: Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks. In: 2010 International Conference on Information and Communication Technology Convergence (ICTC), pp. 482–483, Nov 2010 Roh, H., Jung, S.: Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks. In: 2010 International Conference on Information and Communication Technology Convergence (ICTC), pp. 482–483, Nov 2010
30.
Zurück zum Zitat Franke, J., Kleinjung, T., Paar, C., Pelzl, J., Priplata, C., Stahlke, C.: Shark: a realizable special hardware sieving device for factoring 1024-bit integers. Cryptogr. Hardw. Embed. Syst.-CHES 2005, 119–130 (2005) Franke, J., Kleinjung, T., Paar, C., Pelzl, J., Priplata, C., Stahlke, C.: Shark: a realizable special hardware sieving device for factoring 1024-bit integers. Cryptogr. Hardw. Embed. Syst.-CHES 2005, 119–130 (2005)
31.
Zurück zum Zitat Kotenko, I., Stepashkin, M., Doynikova, E.: Security analysis of information systems taking into account social engineering attacks. In: 2011 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 611–618, Feb 2011 Kotenko, I., Stepashkin, M., Doynikova, E.: Security analysis of information systems taking into account social engineering attacks. In: 2011 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 611–618, Feb 2011
32.
Zurück zum Zitat Proano, A., Lazos, L.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secur. Comput. 9(1), 101–114, Jan–Feb 2012 Proano, A., Lazos, L.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secur. Comput. 9(1), 101–114, Jan–Feb 2012
33.
Zurück zum Zitat Kurita, S., Komoriya, K., Uda, R.: Privacy protection on transfer system of automated teller machine from brute force attack. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 72–77, March 2012 Kurita, S., Komoriya, K., Uda, R.: Privacy protection on transfer system of automated teller machine from brute force attack. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 72–77, March 2012
34.
Zurück zum Zitat Huang, X., Shah, P.G., Sharma, D.: Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In: 2010 4th International Conference on Network and System Security (NSS), pp. 588–593, Sept 2010 Huang, X., Shah, P.G., Sharma, D.: Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In: 2010 4th International Conference on Network and System Security (NSS), pp. 588–593, Sept 2010
35.
Zurück zum Zitat Liu, C.-H., Huang, Y.-Z.: The analysis for DoS and DDoS attacks of WLAN. In: 2010 Second International Conference on Multimedia and Information Technology (MMIT), vol. 2, pp. 108–111, April 2010 Liu, C.-H., Huang, Y.-Z.: The analysis for DoS and DDoS attacks of WLAN. In: 2010 Second International Conference on Multimedia and Information Technology (MMIT), vol. 2, pp. 108–111, April 2010
36.
Zurück zum Zitat Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: ACM SIGCOMM Computer Communication Review, vol. 34, pp. 219–230. ACM (2004) Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: ACM SIGCOMM Computer Communication Review, vol. 34, pp. 219–230. ACM (2004)
37.
Zurück zum Zitat Yucek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutor. 11(1), 116–130 (2009)CrossRef Yucek, T., Arslan, H.: A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Commun. Surv. Tutor. 11(1), 116–130 (2009)CrossRef
38.
Zurück zum Zitat Zhao, Q., Sadler, B.: A survey of dynamic spectrum access. IEEE Signal Process. Mag. 24(3), 79–89 (2007)CrossRef Zhao, Q., Sadler, B.: A survey of dynamic spectrum access. IEEE Signal Process. Mag. 24(3), 79–89 (2007)CrossRef
39.
Zurück zum Zitat Zou, Y., Zhu, J., Yang, L., Liang, Y.C., Yao, Y.D.: Securing physical-layer communications for cognitive radio networks. IEEE Commun. Mag. 53(9), 48–54 (2015)CrossRef Zou, Y., Zhu, J., Yang, L., Liang, Y.C., Yao, Y.D.: Securing physical-layer communications for cognitive radio networks. IEEE Commun. Mag. 53(9), 48–54 (2015)CrossRef
41.
Zurück zum Zitat Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(I), 25 (2008) Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Sel. Areas Commun. 26(I), 25 (2008)
42.
Zurück zum Zitat Soto, J., Queiroz, S., Nogueira, M.: Managing sensing and cooperation to analyze pue attacks in cognitive radio ad hoc networks. In: 2012 8th International Conference on Network and Service Management (CNSM) and 2012 Workshop on Systems Virtualiztion Management (SVM), pp. 219–223 (2012) Soto, J., Queiroz, S., Nogueira, M.: Managing sensing and cooperation to analyze pue attacks in cognitive radio ad hoc networks. In: 2012 8th International Conference on Network and Service Management (CNSM) and 2012 Workshop on Systems Virtualiztion Management (SVM), pp. 219–223 (2012)
43.
Zurück zum Zitat Hao, D., Sakurai, K.: A differential game approach to mitigating primary user emulation attacks in cognitive radio networks. In: 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), pp. 495–502 (2012) Hao, D., Sakurai, K.: A differential game approach to mitigating primary user emulation attacks in cognitive radio networks. In: 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), pp. 495–502 (2012)
44.
Zurück zum Zitat Yu, R., Zhang, Y., Liu, Y., Gjessing, S., Guizani, M.: Securing cognitive radio networks against primary user emulation attacks. IEEE Netw. 30(6), 62–69 (2016)CrossRef Yu, R., Zhang, Y., Liu, Y., Gjessing, S., Guizani, M.: Securing cognitive radio networks against primary user emulation attacks. IEEE Netw. 30(6), 62–69 (2016)CrossRef
45.
Zurück zum Zitat Qin, Z., Li, Q., Hsieh, G.: Defending against cooperative attacks in cooperative spectrum sensing. IEEE Trans. Wirel. Commun. 12(6), 2680–2687 (2013)CrossRef Qin, Z., Li, Q., Hsieh, G.: Defending against cooperative attacks in cooperative spectrum sensing. IEEE Trans. Wirel. Commun. 12(6), 2680–2687 (2013)CrossRef
46.
Zurück zum Zitat Duan, L., Min, A.W., Huang, J., Shin, K.G.: Attack prevention for collaborative spectrum sensing in cognitive radio networks. IEEE J. Sel. Areas Commun. 30(9), 1658–1665 (2012)CrossRef Duan, L., Min, A.W., Huang, J., Shin, K.G.: Attack prevention for collaborative spectrum sensing in cognitive radio networks. IEEE J. Sel. Areas Commun. 30(9), 1658–1665 (2012)CrossRef
47.
Zurück zum Zitat Cepheli, Ö., Kurt, G.K.: Physical layer security in cognitive radio networks: a beamforming approach. In: 2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom), pp. 233–237 (2013) Cepheli, Ö., Kurt, G.K.: Physical layer security in cognitive radio networks: a beamforming approach. In: 2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom), pp. 233–237 (2013)
48.
Zurück zum Zitat Clancy, T.C., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: IEEE Crowncom, pp. 1–8, May 2008 Clancy, T.C., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: IEEE Crowncom, pp. 1–8, May 2008
49.
Zurück zum Zitat Leon, O., Serrano, J.H., Soriano, M.: Securing cognitive radio networks. Intl. J. Commun. Syst. 23, 633 (2010) Leon, O., Serrano, J.H., Soriano, M.: Securing cognitive radio networks. Intl. J. Commun. Syst. 23, 633 (2010)
50.
Zurück zum Zitat El-Hajj, W., Safa, H., Guizani, M.: Survey of security issues in cognitive radio networks. J. Internet Tech. 12(2) 25–37 (2011). On Physical Layer Security for Cognitive Radio Networks El-Hajj, W., Safa, H., Guizani, M.: Survey of security issues in cognitive radio networks. J. Internet Tech. 12(2) 25–37 (2011). On Physical Layer Security for Cognitive Radio Networks
51.
Zurück zum Zitat Xu, W., et al.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, PA, pp. 80–89, Jan 2004 Xu, W., et al.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, PA, pp. 80–89, Jan 2004
52.
Zurück zum Zitat Brown, T.X., Sethi, A.: Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi- dimensional analysis and assessment. Mob. Netw. Appl. 13(5), 516–532 (2008)CrossRef Brown, T.X., Sethi, A.: Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi- dimensional analysis and assessment. Mob. Netw. Appl. 13(5), 516–532 (2008)CrossRef
53.
Zurück zum Zitat Sampath, A., Dai, H., Zheng, H., Zhao, B.Y.: Multi-channel jamming attacks using cognitive radios. In: IEEE ICCCN, pp. 352–357, Aug 2007 Sampath, A., Dai, H., Zheng, H., Zhao, B.Y.: Multi-channel jamming attacks using cognitive radios. In: IEEE ICCCN, pp. 352–357, Aug 2007
54.
Zurück zum Zitat Di Pietro, R., Oligeri, G.: Jamming mitigation in cognitive radio networks. IEEE Netw. 27(3), 10–15 (2013)CrossRef Di Pietro, R., Oligeri, G.: Jamming mitigation in cognitive radio networks. IEEE Netw. 27(3), 10–15 (2013)CrossRef
55.
Zurück zum Zitat Cepheli, Ö., Tedik, S., Kurt, G.K.: A high data rate wireless communication system with improved secrecy: full duplex beamforming. IEEE Commun. Lett. 18(6), 1075–1078 (2014) Cepheli, Ö., Tedik, S., Kurt, G.K.: A high data rate wireless communication system with improved secrecy: full duplex beamforming. IEEE Commun. Lett. 18(6), 1075–1078 (2014)
56.
Zurück zum Zitat Cepheli, Ö., Kurt, G.K., Dartmann, G., Ascheid, G.: A joint optimization scheme for artificial noise and transmit filter for half and full duplex wireless cyber physical systems. IEEE Trans. Sustain. Comput. 3(2) (2018) Cepheli, Ö., Kurt, G.K., Dartmann, G., Ascheid, G.: A joint optimization scheme for artificial noise and transmit filter for half and full duplex wireless cyber physical systems. IEEE Trans. Sustain. Comput. 3(2) (2018)
57.
Zurück zum Zitat Mathur, C.N., Subbalakshmi, K.P.: Digital signatures for centralized DSA networks. In: First IEEE Workshop on Cognitive Radio Networks, Nevada, USA, Jan, Las Vegas, pp. 1037–1041 (2007) Mathur, C.N., Subbalakshmi, K.P.: Digital signatures for centralized DSA networks. In: First IEEE Workshop on Cognitive Radio Networks, Nevada, USA, Jan, Las Vegas, pp. 1037–1041 (2007)
58.
Zurück zum Zitat Cepheli, Ö., Dartmann, G., Kurt, G.K., Ascheid, G.: An encryption aware physical layer security system. In: IEEE International Conference on Communications (ICC) Workshop, Paris, France, 21–25 May 2017 Cepheli, Ö., Dartmann, G., Kurt, G.K., Ascheid, G.: An encryption aware physical layer security system. In: IEEE International Conference on Communications (ICC) Workshop, Paris, France, 21–25 May 2017
59.
Zurück zum Zitat Gokceli, S., Cepheli, Ö., Tedik Basaran, S., Kurt, G.K., Dartmann, G., Ascheid, G.: How effective is the artificial noise? Real-time analysis of a PHY security scenario. In: 5th IEEE GLOBECOM Workshop on Trusted Communications with Physical Layer Security, Singapore, 4–8 Dec 2017 Gokceli, S., Cepheli, Ö., Tedik Basaran, S., Kurt, G.K., Dartmann, G., Ascheid, G.: How effective is the artificial noise? Real-time analysis of a PHY security scenario. In: 5th IEEE GLOBECOM Workshop on Trusted Communications with Physical Layer Security, Singapore, 4–8 Dec 2017
61.
Zurück zum Zitat Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77. ACM (2004) Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77. ACM (2004)
Metadaten
Titel
Physical Layer Security of Cognitive IoT Networks
verfasst von
Güneş Karabulut Kurt
Özge Cepheli
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-42573-9_8

Neuer Inhalt